Hi...
In kali-linux-2023.4-live-amd64 and wifislax64-3.4-final test, hcxdumptool latest git
Sorry, I'm not sure if the kernel is using your driver. , If it not, please ignore
Use rt5572 can capture to PMKID
run command
Create BPF. . .
sudo tcpdump -i wlan0 wlan addr3 AP-MAC -ddd > attack.bpf
sudo hcxdumptool -c 149b --bpf=attack.bpf
CHA LAST R 1 3 P S MAC-AP ESSID (last seen on top) SCAN-FREQUENCY: 5745
-----------------------------------------------------------------------------------------
149 17:36:30 + + + + c43fffffffff CMCC-vKDZ
Next . . .
Test using 8812bu (Chipset: rtw_8822be) canno capture to PMKID
But can capture to handshake
run command . . .
sudo hcxdumptool -c 149b --bpf=attack.bpf
CHA LAST R 1 3 P S MAC-AP ESSID (last seen on top) SCAN-FREQUENCY: 5745
-----------------------------------------------------------------------------------------
149 17:36:34 + c43fffffffff CMCC-vKDZ
LAST E 2 MAC-AP-ROGUE MAC-CLIENT ESSID (last seen on top)
-----------------------------------------------------------------------------------------
^C
0 ERROR(s) during runtime
92 Packet(s) captured by kernel
0 Packet(s) dropped by kernel
1 SHB written to pcapng dumpfile
1 IDB written to pcapng dumpfile
1 ECB written to pcapng dumpfile
1 EPB written to pcapng dumpfile
exit on sigterm
Hi... In kali-linux-2023.4-live-amd64 and wifislax64-3.4-final test, hcxdumptool latest git Sorry, I'm not sure if the kernel is using your driver. , If it not, please ignore
Use rt5572 can capture to PMKID run command Create BPF. . . sudo tcpdump -i wlan0 wlan addr3 AP-MAC -ddd > attack.bpf
Next . . . Test using 8812bu (Chipset: rtw_8822be) canno capture to PMKID But can capture to handshake run command . . .
This seems a driver issue